Full LV Pattern Deck in Chinese (reduced filesize)

Resource name: 
Resource type: 
Pattern cards

Community Oriented Social Media

Pattern ID: 

Access to information and connections is essential to be successful in the 21st century. There is talk in many cities across the country of establishing municipal broadband- for example the grassroots organization “Upgrade Seattle” wants to “make the internet a city-owned and operated utility.” in Seattle.


A possible step further would be to create a publicly owned, operated and funded Social Network that would fill a role similar to that of radio and TV public broadcasting. The first and most obvious benefit would be the same one that comes from public broadcasting, that is- providing an alternative to the corporately owned, commercially funded media platforms, with a greater emphasis on community issues.


The services that companies like Facebook provide are valuable, and many of us willing give up a lot of equally valuable information in exchange for those services. The personal data Facebook mines from us is sold to other companies and used for market analysis, as well for generating personally targeted advertisements. A great wealth of information is produced thru all the clicks and likes and views from the users. All this data could go to good uses the private sector is not likely to be concerned with. Collection of census data and statistics for aiding scientific research are some of the immediate possibilities.


There is a need for people to have greater control over their information and how it is used. Perhaps not only a need, but a right. Then, beyond the issue of how our information is used, there’s the issue of how information filters to us through our “feeds.” The posts we see from our friends and the pages we follow (as well as advertisers) are sifted and prioritized based on hidden algorithms. There should be concern about how this system can create personal bubbles and opinion echo-chambers. Not to mention how it could influence people’s mental states (based on whether they see more police shootings or puppy videos, for example).

Community Action
Pattern status: 


The amount of information that we have gathered as a species, be it in digital, analog or mental formats, is staggering, but a great deal of it has simply been abandoned after it's discovery or creation. The amount of man-hours dedicated to the countless forms of information analysis by as many individuals is incalculable, but a vast array of results from those analyses is or could be readily available to any community seeking niche information. At the time of writing this entry, it was estimated that there exists over 295 exabytes of information stored digitally. A fair amount of this information may be corrupted, duplicates or even the product of random generation, but a fair amount of it is also unique.

Archeodata is distinctly separate from cultural knowledge in that the information it contains was only relevant to it's pursuer(s) and was later abandoned. This does not necessarily mean the information has been lost completely, only that it has been virtually forgotten and/or assumed to have no value. Possible examples could include analytic or statistical data, blueprints, music or computer code, while examples such as social mores, traditions, biological drives, simple relics, physical remains or any modern common knowledge (regardless of "age"/source) would not constitute archeodata. While the medium containing the data itself can sometimes offer addition physical data, what is important to defining archeodata is the presence of qualitative and/or quantitative information that has for all intents and purposes been abandoned, but can/could be accessed and applied to developing new, "cutting edge" perspectives.

As a species we excel at information organization and dissemination. We are rare in that we are capable of mirroring behavior we have not physically seen but instead visualized through analysis of abstract information. The historic correlation between new methods of information dispersal and social "progress" is well accepted, e.g. the advent of writing, the creation of the printing press and telegraph, television and radios. These new technologies have, over the centuries, allowed progressively more information to be made accessible, and with modern digital communication we are now able to disseminate vast amounts of information quickly and easily.
Humanity is the only species known to encode and transmit information through abstract symbolism, i.e. writing, allowing a healthy amount of current understanding to have already been built on archeodata. Modern archaeology and anthropology are focus heavily on the recovery and study of ancient archeodata while many of the modern "hard" sciences owe significant breakthroughs to the recovery and synthesis of the same. For example, during the 1854 Broad Street cholera outbreak Dr John Snow tracked outbreaks of the disease using a standard dot map/Voronoi diagram, then famously used the data to identify the source of the outbreak as the public well on Broad Street. Afterwards, officials rejected his assertion that water was responsible for bearing the disease and his data was abandoned until 1866 when his information was used to combat a similar outbreak in Bromley. These studies were of minor interest to the medical community at the time, but several decades later were of great interest to Pasteur, Cook and Lister as they established modern germ theory. More recently, there is much debate on the ethics of using data from the infamous Nazi freezing experiments, which remains some of our only data on death from exposure. Conversely, after the death of Nokolai Tesla many of his notes were initially seized by the US government, and after declassification showed theories applicable to to modern plasma torches, radar and wireless networks.
The issue of privacy does not apply to true archeodata because it has, by nature, been abandoned or lost, and thus assumed to possess no value by laypersons. Information is only considered sensitive or private when it's dispersal could potentially impact ones freedoms, but this obviously does not apply to what has been discarded. For example, online fetish communities often include a clause in their membership agreement that members cannot use any information about other members obtained through any means for any purpose; this is done with the stated intention of creating a "safe space" or judgement-free community where members can explore interests without social repercussions. Likewise, government surveillance of citizens is a hotly debated topic with similar arguments for and against, where, conversely, examining the sexuality of various historic cultures is as widely accepted as our poring over ancient journals and entering tombs. A defining hallmark of archeodata is that the information holds no value to whomever, if anyone, is aware of it.
Much data already exists, but in addition to organization it also requires verification. For example, until the recovery and translation of Homer's epic cycle the existence of the city of Troy had been forgotten. It was found after centuries of searching evidence to verify the data that had been implied. Conversely, while the existence of Atlantis or Camelot has been implied by various recovered sources there is much more evidence against their existences then for them.  
Archeodata is not limited to information or statistics. A fantastic amount of software code has been written that is considered largely obsolete, ranging from machine-specific drivers to video games, and occasionally this type of information proves useful, or at least entertaining. Conversely, the rate at which software and digital hardware develop can make recovering this type of data difficult: after going out of business, the contractor that built the US military's inventory of A-10 Thunderbolts simply threw out their schematics, forcing the US Air Force to scavenge existing parts until they learned how to build suitable replacements. Similarly, NASA engineers attempting to access old Apollo mission schematics found contemporary hardware incompatible with older storage mediums while the original computers were completely inoperable. Likewise, ancient music has been the subject of much curiosity, but while many ancient instruments have been unearthed relatively few cultures through histories had developed a system of music notation and many of the ancient ones we don't know how to read. 
There also comes the unfortunate truth that at some point, data that is of interest to us now will also lose relevance. Our intense desire to analyze our environment is matched only by our desire to preserve our individual analyses, and it is impossible for one to predict all the ways in which information can be used. Many groups intentionally store archeodata in many forms, ranging from humble time capsules to massive national archives. Perhaps the Ur example of the intentional preperation of archeodata is Wikipedia's Terminal Event Management Policy: should a "non-localized event... render the continuation of Wikipedia in its current form untenable" occur, a series of protocols have been developed to increase the chances of the Wikimedia Foundations data banks being preserved. The "worst-case scenario" scenario, with ten minutes or less until failure, involves broadcasting the entire database, compressed, into space via radio telescopes around the world. Conversely, since 1983 the US Department of Energy has been struggling to figure out how to label nuclear waste disposal sites in such a way that their contents will be recognizable as dangerous for the length of their existence, or about 10,000 years. It feels safe to assume that in the space of that time our language and culture may be lost where artifacts remain, thus leaving the correct archeodata in an accessible way might be our only responsible option.
Data is much like a physical tool in that in can be applied to achieve desired results from the natural world, and in that sense finding new data is sort of like finding that a strange tool: you recognize that it is what it is, even if you just don't know what to do with it, until that perfect moment comes along when everything "clicks" and you see exactly how it can be used. The key is to remembering that even if you can use something as a wrench, that doesn't mean you might not be able to use it later on as a screwdriver or a hammer. 

While the internet and digital communications have already drastically increased accessibility to archeodata, there are vast archives and databases which remain, for whatever reasons, inaccessible. Communities wishing to prepare archeodata for future discovery must preserve it accordingly in an accessible manner, whether digital or analog. The advent of digital communications allow for quick and easy dissemination of large amounts of data, but with the very real possibility of network failure or hardware malfunctions the need for backups is obvious. Adding "tags" to data, or small external pieces of information by which the larger can be identified/sorted, has also shown to be a reliable means of sorting large amounts of information, e.g. the Dewey decimal system, internet tags.

Verbiage for pattern card: 

There already exists a profound amount of information, however that is really all much of it does. Countless individuals have compiled or accumulated vast amounts of data, used it for their purposes and then left it abandoned. This does not negate the validity of their data, but it does insinuate the need for making it accessible. 

Invitation to Join the Collective Intelligence for the Common Good Community / Network

Invitation to join the Collective Intelligence for the Common Good Community / Network

We would like to invite you to participate in a new research and action community network that focuses on Collective Intelligence for the Common Good. We hope that our collaborative efforts will help address our shared challenges.

Project Goals: 
Develop collaborative tools, policies, etc. — and links between them — that have a positive influence in addressing local and global challenges.


Organization's slogan: 
Riseup provides online communication tools for people and groups working on liberatory social change. We are a project to create democratic alternatives and practice self-determination by controlling our own secure means of communications.
Civic Organization Disclaimer: 
Possible disclaimer: This information has been entered by a person who isn't associated with the organization. It may be incomplete or contain mistakes. If you are associated with this organization and would like to maintain this information, please get a Public Sphere Project account and ask us to transfer ownership of this information to you.



We provide secure and private email accounts, accessible via the web, shell, IMAP, or POPGet help on mailLogin to webmailRequest an accountReset lost passwordChange my settings.

Mailing Lists

We provide mailing lists for activist organizations. Get help on lists.Login to listsRequest a listSubscribeUnsubscribe.

New Services

We are testing VPNchat, and etherpad services. These services are still under development, and may be unreliable at times. If you want to help test them, please give them a try.



Resources and tutorials for more secure communication.

Help Desk

In order to contact us with a question, use the help desk form to create a help ticket. But first, please search and read the online documentation found on this site.

Organizational engagement: 
Organization's geographic focus: 

CIRAL Web Space

The creation of a living body of knowledge that is easily accessible and updateable is an important component of CIRAL.  By creating this space on the Public Sphere Project, the Liberating Voices pattern language can be easily incorporated into the work to facilitate the sense of shared vision CIRAL is striving for.

Project Goals: 
Become a centralized online space for the work of CIRAL
Facilitate project design and coordination
Host action and research results to form a growing body of knowledge

Participatory Culture Foundation

Organization's slogan: 
We make open tools for the shared culture we’re all creating together.
Civic Organization Disclaimer: 
Disclaimer: This information has been entered by a person who isn't associated with the organization. It may be incomplete or contain mistakes. If you are associated with this organization and would like to maintain this information, please get a Public Sphere Project account and ask us to transfer ownership of this information to you.

Democracy and culture can only thrive when people are engaged in creating the world around them; not when they are passive recipients or alienated from the society they live in.

Participatory Culture Foundation (PCF), a 501c3 non-profit organization, is dedicated to supporting a democratic media by creating open and decentralized video tools and services. We work to eliminate gatekeepers and empower communities around the world.

They have created tools such as Miro which is a participatory video uploading, sharing, and viewing program/service. They also created a method for creating universal subtitles and started the Open Video Alliance.

Organizational engagement: 

Free Software Foundation

Organization's slogan: 
The Free Software Foundation (FSF) is a nonprofit with a worldwide mission to promote computer user freedom and to defend the rights of all free software users.
Civic Organization Disclaimer: 
Possible disclaimer: This information has been entered by a person who isn't associated with the organization. It may be incomplete or contain mistakes. If you are associated with this organization and would like to maintain this information, please get a Public Sphere Project account and ask us to transfer ownership of this information to you.

As our society grows more dependent on computers, the software we run is of critical importance to securing the future of a free society. Free software is about having control over the technology we use in our homes, schools and businesses, where computers work for our individual and communal benefit, not for proprietary software companies or governments who might seek to restrict and monitor us.

The Free Software Foundation is working to secure freedom for computer users by promoting the development and use of free (as in freedom) software and documentation — particularly the GNU operating system — and by campaigning against threats to computer user freedom like Digital Restrictions Management (DRM) and software patents.

Year the organization was founded: 
Organizational engagement: 
Organization's headquarters: 
Boston, MA

Tor Project

Organization's slogan: 
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis
Civic Organization Disclaimer: 
Possible disclaimer: This information has been entered by a person who isn't associated with the organization. It may be incomplete or contain mistakes. If you are associated with this organization and would like to maintain this information, please get a Public Sphere Project account and ask us to transfer ownership of this information to you.

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

Organizational engagement: 
Contact person: 
The Tor Project
Contact information: 

Civics of Modern Media

As the means of communication have changed over the course of American history, so has the way public discourse has been carried out. National radio was a revolution that could put the voice of the president in every living room across the nation for fireside chats. With the rise of television, the firm jaw of Walter Cronkite could relay the facts as millions of viewers tuned in every night.

Post Image: 
Image Credit: 
Tor Even Mathisen - CC: A, NC, SA
Syndicate content